Tag

KASAN

1 views collected around this technical thread.

Deepin Linux
Deepin Linux
May 24, 2025 · Information Security

Understanding KASAN: Kernel Address Sanitizer for Detecting Memory Errors in Linux

The article introduces KASAN, a Kernel Address Sanitizer for Linux that uses shadow memory and redzones to accurately detect out‑of‑bounds accesses, use‑after‑free, and double‑free errors, explains its underlying mechanisms, shows how to enable it in the kernel, and provides extensive example code and log analysis.

KASANKernel Address SanitizerLinux Kernel
0 likes · 34 min read
Understanding KASAN: Kernel Address Sanitizer for Detecting Memory Errors in Linux
IT Services Circle
IT Services Circle
Aug 12, 2024 · Information Security

The 'Indler' Linux Kernel Vulnerability: A 0‑Day Exploit Discovered After 12 Years

A newly disclosed Linux kernel vulnerability called "indler"—a 0‑day memory‑corruption bug hidden since 2012—was uncovered by security researcher Zhang Yinkui, who detailed its discovery via a random kernel oops, KASAN detection, and its potential for massive remote code execution across billions of devices.

0-DayKASANLinux
0 likes · 9 min read
The 'Indler' Linux Kernel Vulnerability: A 0‑Day Exploit Discovered After 12 Years
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Nov 13, 2020 · Information Security

Understanding KASAN: Principles and Usage in the Linux Kernel

KASAN, the Kernel Address Sanitizer, is a built‑in Linux kernel tool that uses shadow memory to mark each 8‑byte block’s accessibility, enabling detection of out‑of‑bounds and use‑after‑free errors while consuming about one‑eighth of RAM and requiring kernel configuration changes to activate.

KASANLinux kernelMemory Debugging
0 likes · 8 min read
Understanding KASAN: Principles and Usage in the Linux Kernel